A Steganographic Technique using Reverse-SSpace Filling Curve
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
A space-filling curve (SFC) maps the multi-dimensional space into the one-dimensional space. Mapping the multidimensional space into one-dimensional domain plays an important role in many application. For embedding the secret data in an image, Reverse-S-space filling curve can be used. This paper proposes a technique of steganography in which the information is hidden exclusively in the form of images, where it adopted Multi-dimensional Surface Fitting (MSF), the technique is based on the essentials of secret codes written in MATLAB.
Authors and Affiliations
R. Prethee, A. R. Rishivarman
Method & Implementation of Efficient Approach to Provide Max Flow in WSN
The WSN network fails due to the depletion of energy in the central ring of nodes around the sink node, leaving the sink node segmented from the remaining viable network nodes. With the existing protocol, at the extinct...
Silicon Wafer Technologies: Past & Future
Silicon is now best substrate material for IC technologies. This paper is review about development of wafer technologies in past and future. Also discuss about silicon crystal growth, Silicon on Insulator technologies a...
slugAnalytical and Computational Analysis of Blade Parameter on the performance of L.P axial flow turbines
Since axial flow turbine are widely been used in order to achieve adequate compressibility of fluid in concern to develop power. However axial flow turbines are generally used in gas turbine engine or power plant in for...
Automatic Irrigation System using Embedded System and GSM Technology
The increase in human population resulted in the increase of the demand for food production. Farmers are unable to meet the requirements due to irregular water supply. To meet the demand, a new type of system is needed...
Study On SQL Injection Attacks: Detection And Prevention
SQL injection also referred to as SQLI in short. It is the most dangerous way in which our data can be hacked. Hackers can get to our databases prudently through Web Interface and can delete, modify the important conten...